Encrypted video traffic content analysis method based on sequence similarity

A sequence similarity and content analysis technology, applied in selective content distribution, image communication, electrical components, etc., can solve the problems of insufficient scalability of the recognition model and inability to handle unknown types of network flows, etc., to achieve accurate analysis results and ensure content Sexually safe, low-complexity effects

Pending Publication Date: 2022-02-08
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current encrypted video traffic content analysis is based on the technical route of supervised classification, and its recognition model is not scalable enough to handle unknown types of network traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted video traffic content analysis method based on sequence similarity
  • Encrypted video traffic content analysis method based on sequence similarity
  • Encrypted video traffic content analysis method based on sequence similarity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0040] The present invention designs a method for analyzing content of encrypted video traffic based on sequence similarity, the frame diagram of the method is as follows figure 2 shown, including:

[0041] In the first step, tagged video traffic data is collected from the network and classified and managed to form a video traffic database, which contains multiple records.

[0042] In order to realize the automated collection of encrypted video traffic, it is first necessary to use automated testing technology as a support to realize automatic video playback. Automated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted video traffic content analysis method based on sequence similarity, and the method comprises the steps: collecting video traffic data with labels from a network, and carrying out the classification management, thereby forming a video traffic database; for the to-be-analyzed encrypted video traffic, converting the to-be-analyzed encrypted video traffic into a video clip sequence through a video clip sequence conversion module; carrying out sequence similarity analysis on the video clip sequence, firstly calculating the lewinstein distance between the video clip sequence and each record in a video traffic database, and then selecting the content information of one record with smaller lewinstein distance with the video clip sequence as an analysis result; and if the analysis result is verified later, adding the analysis result to the video traffic database. The method can be applied to real-time monitoring of the playing condition of the illegal video in network monitoring, and has important significance for guaranteeing the content security of the network space.

Description

technical field [0001] The invention belongs to the field of network flow detection, in particular to a method for analyzing encrypted video flow content based on sequence similarity. Background technique [0002] With the development of Internet technology, network traffic has shown explosive growth. At the same time, the proportion of video traffic in the total traffic of the entire network is also increasing. How to identify illegal video content from a large amount of video traffic is an important research direction. However, with the wide application of traffic encryption technology represented by Transport Layer Security (TLS), more and more video traffic is transmitted in an encrypted manner, which brings great challenges to network supervision. [0003] In order to improve user experience, network video website operators use HTTP-based Dynamic Adaptive Streaming (DASH) mechanism to improve service quality. The basic principles of DASH are as follows: figure 1 As ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/2347H04N21/234H04N21/4408H04N21/44
CPCH04N21/2347H04N21/23418H04N21/4408H04N21/44008Y02D30/50
Inventor 杨璐铭付绍静王勇军李超屈龙江孙兵周悦刘国强刘韵雯周子健
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products